mmo

Results 1051 - 1075 of 1084Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Dec 01, 2017
A common misconception about hyperconverged infrastructure (HCI) is that because data services are software-defined, the hardware doesn’t matter. It’s easy to see why—the software driving HCI solutions such as the Dell EMC XC Series (in this case, Nutanix software) is exceptional. It efficiently manages data and communications across a cluster of nodes and storage tiers, keeping the cluster and virtual machines (VMs) up and running, delivering optimal performance and availability. Software-defined infrastructure is changing the way data services are delivered, making companies more efficient and agile, and reducing costs. Download the study to learn more about the latest trends. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC
Published By: Thomson Reuters     Published Date: Mar 08, 2018
Although AI and big data have delivered advances in technology these past years which make remediation more manageable and more efficient, it’s important ensure that the solution you select, meets your particular requirements, addresses and meets your needs. Some jurisdictions require technology dealing with certain types of data to be hosted on-site; data hosting, exchange, protection and privacy can all affect the choice of solution or vendor. It’s common for companies to call out these specifics in their RFPs. Other considerations include the level of precision and recall (e.g., the accuracy) required to meet project needs, the setup time for a system, its implementation and the ability to support globally dispersed team members.
Tags : 
technology, financial, sector, database, thomson, reuters
    
Thomson Reuters
Published By: Thomson Reuters     Published Date: Mar 08, 2018
Many seasoned attorneys will agree that remediating an enormous amount of documentation to ensure regulatory compliance is no easy feat. The volume of repapering necessary for compliance with the new rules governing margin requirements for non-centrally cleared derivatives (UMR) presented new challenges, exposed structural weaknesses, and provided many lessons learned which can be applied to any documentation remediation effort. Many UMR initiatives suffered significant hurdles that contributed to delays and missed deadlines. Common among the various challenges faced were the dearth of talent in the quantities needed, and the limited technology and data management solutions utilized.
Tags : 
legal. umr, project, management, alsp, thomson, reuters
    
Thomson Reuters
Published By: Turn     Published Date: Mar 09, 2016
This webinar will look at how a smart approach to viewability can drive better campaign results and optimize marketing ROI. Guest speaker Susan Bidel of Forrester Research and Lori Gubin of Turn will examine how viewability can support digital branding in display and video, where viewability fits in the spectrum of brand metrics, and how advertisers can avoid common viewability-related pitfalls.
Tags : 
programmatic, video advertising, impression quality, dsp, demand side platform, viewable campaigns, viewability, measurement, programmatic advertising, smart market, omnichannel, multichannel
    
Turn
Published By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : 
ibm, hybrid it operations, cloud, mss, managed security services
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise’s data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more
Tags : 
ibm, security, office 365, access management deployment, access management, enterprise data, cloud, security measures
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. Download this white paper to learn how.
Tags : 
database, big data, analytics, infrastructure
    
IBM
Published By: IBM     Published Date: Oct 27, 2016
The benefits of modernization are compelling, but more than half of these projects fail. Most businesses lack the expertise, time and resource to undertake successful modernization efforts. How can you ensure you avoid these common mistakes? Find out the 4 top reasons why modernization fails in our Slideshare.
Tags : 
ibm, leadership, innovation, modernization
    
IBM
Published By: SolidFire_NetApp     Published Date: May 10, 2016
When comparing the architecture for Ceph and SolidFire, it is clear that both are scale-out storage systems designed to use commodity hardware, and the strengths of each make them complementary solutions for datacenter design.
Tags : 
    
SolidFire_NetApp
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Enterprises are moving to the cloud because it offers greater flexibility and lower cost. The first wave of cloud native and content apps are well on their way, but there's a new wave of traditional enterprise applications that enterprises are still struggling to move to the cloud. The Q&A walks you through the most common issues related to cloud storage—and how HPE Cloud Volumes put any remaining concerns to rest.
Tags : 
    
Hewlett Packard Enterprise
Published By: Jamf     Published Date: Jun 07, 2018
A decade ago, Mac was an uncommon sight in many businesses and routinely ignored by corporate IT — but times have changed. Today, employee-choice programs are driving Mac growth in enterprises with 72 percent of employees choosing Mac over PC when given the chance. Now, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy, and walks you through: • The current state of enterprise management solutions • Features required for best-of-breed Apple management • How Jamf and Microsoft are delivering co-management to the enterprise
Tags : 
    
Jamf
Published By: Veritas     Published Date: Jan 03, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas
Published By: CBRE     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
    
CBRE
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocent—but sometimes devastating—errors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : 
malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
    
IBM
Published By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
    
CrowdStrike
Published By: Dun & Bradstreet     Published Date: Feb 21, 2017
As the volume of data coming into organizations – from both internal and external sources – continues to grow and makes its way across departmental systems in many different formats, there is a critical need to create a single, holistic view of the key data entities in common use across the enterprise. Master Data Management (MDM) aims to accomplish this goal. Not surprisingly, MDM has become a significant priority for global enterprises, with the market expected to triple from $9.4B to $26.8B by 2020 according to analysts. The reality, though, is that while seemingly everyone is investing heavily in the tools to manage data, few are putting a great enough emphasis on the data itself. And that’s a problem. Poor data quality is said to be costing businesses $3.1 trillion annually – and that’s just in the US alone. The information being put into MDM tools must be mastered first and foremost.
Tags : 
managing data, data management insight, mdm, master data management
    
Dun & Bradstreet
Published By: Mitto     Published Date: Jun 06, 2017
APQC reports that 30% of CFOs that are unhappy with their current planning solution.1 Most FP&A professionals want a planning and forecast process that is fast and repeatable. They want the financial data to be accurate and transparent to the deepest levels. They need planning tools that provide structure to streamline the process and flexibility to accommodate changes in the business. And they require analysis and reporting that bring visibility to the state of the business and lead to actionable insights. This paper details five best practices that Finance teams can follow to improve their planning and forecasting and influence the strategy of an organization.
Tags : 
veritas, backup, recovery, netbackup
    
Mitto
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Companies that manufacture industrial equipment find themselves in a unique place among manufacturers: • Their products can range from small components to mammoth machines for mines or mills. • They rarely order large production runs and may be called on to create a process that results in an order of one. • Their markets impose challenging constraints. Customers want more choices, more options, more extras, and more features. And they want the order to be fulfilled sooner. The competitive environment is forcing model cycles to shrink, pressuring manufacturers to accelerate processes that are unable to keep pace. Dassault Systèmes DELMIA has assembled an industry-specific set of roles for industrial equipment manufacturers that brings these challenges under control.
Tags : 
    
Dassault Systèmes
Published By: Wasabi     Published Date: Oct 24, 2017
An explosion of data storage needs, both in terms of volume and accessibility, are unmet by first-generation storage solutions. The massive datasets being generated are un-storable due to costs and unable to be fully leveraged because of speed limitations. The needs of individual businesses, and our greater economy, demand the commoditization of cloud storage. Cloud Storage 2.0 represents a new generation of solutions that promise to turn Cloud Storage into a utility along the lines of bandwidth and electricity. Leading this evolution with high-speed, low cost, reliable cloud storage is Wasabi. In this white paper we look at the genesis and possibilities of Cloud Storage 2.0, and Wasabi’s place at its forefront. Free trial with no credit card required offer available as well.
Tags : 
    
Wasabi
Published By: Insight     Published Date: Nov 16, 2017
With the mobile worker population on track to exceed 105 million by 2020, organizations in all industries are in a critical race to accommodate a new breed of worker. Comprised of millennials and Gen Xers alike, this new workforce expects seamless work experiences from device to desktop to laptop, anywhere, anytime. They demand to be fully equipped with the apps they need to do their best work — all without a hitch in the back-end systems and security that power and support them.
Tags : 
digital workforce, mobile worker, insight's connected workforce, intune, modern devices, end-user experiences
    
Insight
Published By: Group M_IBM Q1'18     Published Date: Jan 08, 2018
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. This e-book presents six reasons why you should consider a database change, including opinions from industry analysts and real-world customer experiences. Read on to learn more.
Tags : 
database, streamlining, it infrastructure, database systems
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Jul 05, 2018
IBM® Information Governance Catalog helps you understand your information and foster collaboration between business and IT by establishing a common business vocabulary on the front end, and managing data lineage on the back end. By leveraging the comprehensive capabilities in Information Governance Catalog, you are better able to align IT with your business goals. Information Governance Catalog helps organizations build and maintain a strong data governance and stewardship program that can turn data into trusted information. This trusted information can be leveraged in various information integration and governance projects, including big data integration, master data management (MDM), lifecycle management, and security and privacy initiatives. In addition, Information Governance Catalog allows business users to play an active role in information-centric projects and to collaborate with their IT teams without the need for technical training. This level of governance and collaboration c
Tags : 
    
IBM
Start   Previous    30 31 32 33 34 35 36 37 38 39 40 41 42 43 44    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.